Background: In young adults, multiple sclerosis is a prevalent chronic inflammatory demyelinating condition. It is characterized by white matter affection, but many individuals also have significant gray matter involvement. A double-inversion recovery pulse (DIR) pattern was recently proposed to improve the visibility of multiple sclerosis lesions. Objective: To find out how well a DIR sequence, FLAIR, and T2-weighted pulse sequences can find MS lesions in the supratentorial and infratentorial regions. Methods: A total of 37 patients with established diagnoses of multiple sclerosis were included in this cross-sectional study. Brain MRI was done using double inversion recovery, T2, and FLAIR sequences. The number of lesions was counted and compared in the three sequences. Results: The DIR sequence detected more infratentorial lesions when compared to the T2 and FLAIR sequences. In the supratentorial region, DIR detected more lesions than T2 and FLAIR. Conclusion: The DIR sequence is highly superior to both the T2 and FLAIR sequences in depicting the lesions, regardless of their anatomical distribution. Moreover, the DIR sequence detected more multiple sclerosis lesions in the infratentorial region than the traditional T2W and FLAIR sequences.
This study is the first investigation in Iraq dealing with genotyping of
Glutathione S-transferases (GSTs) are enzymes that included, in a more range of detoxifying reactions by conjugation of glutathione, to electrophilic material. Polymorphisms n the genes that responsible of GSTs affect, the function of the GSTs. GSTs play an active role in protection of cell against oxidative stress mechanism. Polymorphisms of GSTP1 at codon 105 amino acids forms GSTP1 important site for bind of hydrophobic electrophiles and the substitution of Ile/Val affect substrate specially catalytic activity of the enzyme and may correlate with reach to different diseases in human like diabetes mellitus type2 disease. Correlation between these polymorphisms and changes in the parameters file of diabetic patients has also bee
... Show MoreObjective: To assess role of obesity in Covid-19 patients on antibodies production, diabetes development, and treatment of this disease. Methodology: This observational study included 200 Covid-19 patients in privet centers from January 1, 2021 to January 1, 2022. All patients had fasting blood sugars and anti-Covid-19 antibodies. Anthropometric parameters were measured in all participants. Results: The patients were divided into two groups according to body weight; normal body weight (50) and excess body weight (150). There was a significant difference between them regarding age. Diabetes mellitus developed in 20% of normal weight patients while 80% of excess weight patients had diabetes (p=0.0001). Antibodies production (IgM and
... Show MoreObjective: To assess role of obesity in Covid-19 patients on antibodies production, diabetes development, and treatment of this disease. Methodology: This observational study included 200 Covid-19 patients in privet centers from January 1, 2021 to January 1, 2022. All patients had fasting blood sugars and anti-Covid-19 antibodies. Anthropometric parameters were measured in all participants. Results: The patients were divided into two groups according to body weight; normal body weight (50) and excess body weight (150). There was a significant difference between them regarding age. Diabetes mellitus developed in 20% of normal weight patients while 80% of excess weight patients had diabetes (p=0.0001). Antibodies production (IgM and
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreOver the years, the prediction of penetration rate (ROP) has played a key rule for drilling engineers due it is effect on the optimization of various parameters that related to substantial cost saving. Many researchers have continually worked to optimize penetration rate. A major issue with most published studies is that there is no simple model currently available to guarantee the ROP prediction.
The main objective of this study is to further improve ROP prediction using two predictive methods, multiple regression analysis (MRA) and artificial neural networks (ANNs). A field case in SE Iraq was conducted to predict the ROP from a large number of parame